Which three advanced permit actions within security policies

题目
多选题
Which three advanced permit actions within security policies are valid?()
A

Mark permitted traffic for firewall user authentication.

B

Mark permitted traffic for SCREEN options.

C

Associate permitted traffic with an IPsec tunnel.

D

Associate permitted traffic with a NAT rule.

E

Mark permitted traffic for IDP processing.

参考答案和解析
正确答案: C,E
解析: 暂无解析
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Under which Junos hierarchy level are security policies configured?()

A. [edit security]

B. [edit protocols]

C. [edit firewall]

D. [edit policy-options]


参考答案:A

第2题:

Which file characteristic cannot be used in the Cisco IronPort Data Security policies?() 

  • A、 file type
  • B、 file size
  • C、 file age
  • D、 file  name

正确答案:C

第3题:

Which three actions are allowed in event details? ()(Choose three.)

A.Send

B.Raise

C.Delete

D.Receive

E.Acknowledge


参考答案:A, B, D

第4题:

You want to allow your device to establish OSPF adjacencies with a neighboring device connected to interface ge-0/0/3.0. Interface ge-0/0/3.0 is a member of the HR zone.Under which configuration hierarchy must you permit OSPF traffic?()

  • A、[edit security policies from-zone HR to-zone HR]
  • B、[edit security zones functional-zone management protocols]
  • C、[edit security zones protocol-zone HR host-inbound-traffic]
  • D、[edit security zones security-zone HR host-inbound-traffic protocols]

正确答案:D

第5题:

Which VMS Security Monitor tool allows you to monitor data for patterns of attacks from onemachine to a list of targets?  ()

  • A、 Advanced Correlation Engine
  • B、 Advanced Notification Engine
  • C、 CiscoWorks Dashboard
  • D、 Management Center for CSA

正确答案:A

第6题:

Which of the following are examples of physical security measures?()

A. Policies and procedures

B. Encryption

C. Locked doors

D. Security personnel

E. Backup tapes


参考答案:C, D

第7题:

What are three characteristics that buyers of Cisco Small Business routers typically look for?()

  • A、 basic security options
  • B、 simple network configuration
  • C、 advanced network configuration
  • D、 integrated solutions
  • E、 advanced security options
  • F、 point products

正确答案:B,E,F

第8题:

Which three advanced permit actions within security policies are valid?() (Choose three.)

A. Mark permitted traffic for firewall user authentication.

B. Mark permitted traffic for SCREEN options.

C. Associate permitted traffic with an IPsec tunnel.

D. Associate permitted traffic with a NAT rule.

E. Mark permitted traffic for IDP processing.


参考答案:A, C, E

第9题:

Which two configuration elements are required for a policy-based VPN?()

  • A、IKE gateway
  • B、secure tunnel interface
  • C、security policy to permit the IKE traffic
  • D、security policy referencing the IPsec VPN tunnel

正确答案:A,D

第10题:

Which of these user ICAP?()

  • A、 anti-malware scanning
  • B、 data loss prevention polices
  • C、 decryption policies
  • D、 CiscoIronPort Data Security policies

正确答案:B

更多相关问题